Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

Networking

Multiple Choice (Select 1 out of 4 options for the question below)


Which is the key exchange algorithm used in Ciphersuite parameters?
RSA
Fixed diffie helman
Ephemeral diffie-helman
Any of the mentioned

Multiple Choice (Select 1 out of 4 options for the question below)


Which of the following is an essential concept related to cloud
Reliablility
Abstraction
Productivity
All of the above

Multiple Choice (Select 1 out of 4 options for the question below)


Interaction between the client and the server starts via the ____ message
Client_hi
Client_hello
Sever _hellow
server_hi

Multiple Choice (Select 1 out of 4 options for the question below)


Which one of the following can be considered as the class of compute threads?
1) dos attack
2) phishing
3) soliciting
4) both a and b

which of the following can be considered as the utility is a dream that dates from the beginning of the
computing Industry itself?
1) computing
2) model
3) software
4) all the above

in which of the following a person is constantly followed by another person or group of several
peoples?

1) phishing
2) bulling
3) stalking
4) identity theft
Question 7
which of the following we should configure your systems and networks as correctly as possible

1) protection
2) detection
3) reaction
4) none of the above

SaaS stands for


1) software as a service
2) system software and services
3) software as a system
4) system as a service

Question 9
which is the most of the cloud architectures are build on this type of architecture

1) skeleton
2) grid
3) linear
4) template

Question 10
which one of the following refers to the technique used for verifying the integrity of the message
1) digital signature
2) decryption algorithm
3) protocol
4) message digest

Multiple Choice ( Select 1 out of 4 options, for the question below. )


Which one of the following is actually considered as the first computer virus?
1) Sasser
2) Blaster
3) Creeper
4) Both A and C
Question 12
Multiple Choice ( Select 1 out of 4 options, for the question below. )
IPSec defines two protocols ___________ and ___________
1) AH:SSP
2) ESP:SSP
3) AH:EH
4) None of the above

Question 13
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Code Red is a type of _______
1) An Antivirus Program
2) A photo editing software
3) A computer virus
4) A video editing software

Question 14
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which of the model involves the special types of seervices that user can access on a Cloud
Computing platform?
1) Service
2) Planning
3) Deployment
4) Application

Question 15 Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which of the folllowing is not a type of scanning?
1) Xmas Tree Scan
2) Cloud scan
3) Null Scan
4) SYN Stealth

Question 16
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which one of the following is related to the services provided by Cloud?
1) Sourcing
2) Ownership
3) Reliability
4) PaaS

Question 17
Multiple Choice ( Select 1 out of 4 options, for the question below. )
The ______ protocol is designed to authenticate the source host and to ensure the integrity of the
payload carried by the IP packet.
1) AH
2) ESP
3) SPE
4) None of the above

Question 18
Multiple Choice ( Select 1 out of 4 options, for the question below. )
In how many parts can we brodly devide the architecture of the Cloud?

1) 4
2) 3
3) 2
4) 5

Question 19
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which of the following refers to the user's part of the Cloud Computing system?

1) Back-End
2) Management
3) INfrastructure
4) Front End

Question 21
Wi-Fi stands for:
1) wireless fidelity
2) wireless lan
3) wireless flan
4) none of the above

Question 22
A network comprising of multiple topologies:
1) complex
2) hybrid
3) bus
4) star

Question 23
which one of the following is also known as hypervisor?
1) VMA
2) VMM
3) VMS
4) VMR

Question 24
Into which expenditure does coud computing shift capital expenditure?
1) local
2) operating
3) service
4) none of the above
Question 25
The parallels desktop can be considered as the example of which of the following?
1) Tpe 2 Hypervisor
2) DISPATCHER
3) Type 1 Hypervisor
4) interpreter

Question 26
____LAN topology describes the possible conncetions between pairs of networked end points that
can communicate
1) complex
2) physical
3) logical
4) incremental

Question 27
"When bogus reconfiguration commands are used to affect routers and switches to degrade
netwrok performance" Which type of wireless network threat would you classify this under?
1) Network injection
2) malicious association
3) man in the middle attack
4) denial of service

Question 28
A serially connected system of all the hubs of networks
1) bus
2) ring
3) daisy chains
4) star

Question 29
"When there is lack of a central point of control" Which type of wireless network threat would you
classify this under?
1) man in the middle attack
2) identify threat
3) AD Hoc Network
4) None of the above

Question 30
Which one of the following is a type of antivirus program?
1) Quick heal
2) Mcafee
3) Kaspersky
4) All of the above

Question 31
Which of the following is provided by ownership dimension of Cloud Cube Model?
1) Proprietary
2) Owner
3) P
4) All of the mentioned
Question 32
Message authentication is a service beyond
1) message confidentiality
2) message integrity
3) message splashing
4) message sending

Question 33
Which one of the following is a phase of the Deployment process?
1) Selecting Cloud Computing Provider
2) IT Architecture Development
3) Business Architecture Development
4) Transformation Plan Development

Question 34
In the Planning Phase, Which of the following is the correct step for performing the analysis?
1) Cloud Computing Value Proposition
2) Cloud Computing Strategy Planning
3) Both A and B
4) Business Architecture Development

Question 35
Which of the following refers to stealing one's idea or invention of others and use it for their own
benefits?
1) Piracy
2) Plagiarism
3) Intellectual property rights
4) All of the above

Question 36
What is true about VPN in Network security methods?
1) A tool that authenticates the communication between a device and a secure network
2) VPN creating a secure, encrypted "tunnel" across the open internet.
3) VPN typically based on IPsec or SSL
4) All of the above

Question 37
Which of the following refers to exploring the appropriate, ethical behaviors related to the online
environment and digital media platform?
1) Cyber low
2) Cyberethics
3) Cybersecurity
4) Cybersafety

Question 38
It can be a software program or a hardware device that filters all data packets coming through the
internet, a network, etc. it is known as the _____________.
1) Antivirus
2) Firewall
3) Cookies
4) Malware

Question 39
How many types of security boundary values exist in Cloud Cube model?
1) 1
2) 2
3) 3
4) None of the mentioned

Question 40
Message confidentiality or privacy means that the sender and the receiver expect
1) integrity
2) confidentiality
3) Authentication
4) nonrepudiation

Question 41
Which of the following dimension is related to organization's boundaries?
1) Physical location of data
2) Ownership
3) Security boundary
4) All of the mentioned

Question 42
The three different service models are together known as the _________ model of cloud computing.
1) SPI
2) SIP
3) CPI
4) All of the mentioned

Question 43
What was the security algorithm defined for the IEE 802.11 ?
1) WEP
2) RSN
3) WPA
4) SSL

Question 44
Which the 3rd phase of operation in the IEEE 802.11i Protocol ?
1) Protected Data Transfer
2) Discovery
3) Authentication
4) Key Management

Question 45
A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are
bound together as a unit.
1) Public
2) Private
3) Community
4) Hybrid

Question 46
The message digest needs to be
1) public
2) private
3) kept secret
4) integrity

Question 47
Which of the following is related to the service provided by Cloud?
1) Sourcing
2) Ownership
3) Reliability
4) AaaS

Question 48
In which phase of operation does the STA and AS prove their identities to each other ?
1) Discovery
2) Authentication
3) Key generation and distribution
4) Protected data transfer

Question 49
EAP stands for --
1) Extended Application Protocol
2) Extensible Authentication Protocol
3) Embedded Application Protocol
4) Embedded Authentication Protocol
Question 50
Select the most refined and restrictive service model
1) PaaS
2) Caas
3) IaaS
4) All of the above

Question 51
Select the command that will allow SMTP mail to only host 1. 1. 1. 1
1) access-list 10 permit smtp host
2) access-list 10 permit tcp any host 1.1.1.1 eq smtp
3) access-list 110 permit tcp any host 1.1.1.1 eq smtp
4) access-list 10 permit smtp host 1.1.1.1

Question 52
Interaction between the client and server starts via the _______ message.
1) client_hi
2) client_hello
3) server_hello
4) server_hi

Question 53
What are the Parallel Desktops an example of?
1) DISPATCHER
2) INTERPRETER
3) TYPE-1 Hypervisor
4) TYPE-2 Hypervisor

Question 54
What type of the computing technology is used to refer to services and software that usually
operate on a distributed network via virtualized resources?
1) Parallel Computing
2) Soft Computing
3) Cloud Computing
4) Distributed Computing

Question 55
Select the command used to apply an access list to a router interface?

1) ip access-list 101 out


2) access-list ip 101 in
3) ip access-group 101 in
4) access-group ip 101 in

Question 56
What do you call the text that gets transformed using algorithm cipher?
1) Plain Text
2) Scalar text
3) Complex Text
4) Transformed Text

Question 57
What does CHAP stand for?
1) Circuit Handshake authentication protocol
2) Circuit hardware authentication protocol
3) Challenge Hardware authentication protocol
4) Challenge Handshake authentication protocol
Question 58
Select the correct statement in relation to VPN in Network security methods.
1) VPN typically based on IPsec or SSL
2) VPN creating a secure, encrypted "tunnel" across the open internet
3) A tool that authenticates the communication between a device and a secure network
4) All of the above
Question 59
Under which model does SaaS support multiple users and offer a shared data model?
1) Multi-tenancy
2) Multiple-instance
3) single-tenancy
4) None of the above
Question 60
Which is the most essential concept related to Cloud Computing?
1) Abstraction
2) Reliability
3) Productivity
4) All of the above
Question 61
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Triple-DES has _____ keys.
1) 1
2) 2
3) 5
4) 4
Question 62
How many types of service model are mainly present in cloud?
1) 1
2) 2
3) 3
4) 4
Question 63
Multiple Choice ( Select 1 out of 4 options, for the question below. )
In public key crytography, a key that decrypts the message.
1) public key
2) unique key
3) private key
4) security key
Question 64
which of the following is not applicable for IP?
1) Error reporting
2) Handle addressing conventions
3) Datagram format
4) Packet handling conventions
Question 65
Multiple Choice ( Select 1 out of 4 options, for the question below. )
The TTL field has a value 10. How many routers (max) can process this datagram?
1) 11
2) 5
3) 10
4) 1

Question 66
DES stands for?
1) Data Encryption Standard
2) Data Encryption Statistics
3) data Encryption System
4) Data Encryption Sequence
Question 67
Which of the following is the Virtual machine conversion cloud?
1) Amazon CloudWatch
2) AbiCloud
3) BMC Cloud Computing initiative
4) None
Question 68
Multiple Choice ( Select 1 out of 4 options, for the question below. )
________ is a measure of whether the operation is inside or outside the security boundary or
network firewall.
1) Per
2) P
3) Pre
4) All of the mentioned

Question 69
Common gateway interface is used to ___________
1) generate executable files from web content by web server
2) generate web pages
3) stream videos
4) download media files
Question 70
Which of the following statement is true about Grid Computing?

1)
Pieces combine small tasks into complex tasks
2)
The subscription tier plays an important role in grid computing
3)
4)
Both A and C
Breaks complex tasks into small operations
Answer: 4

Question 71
Multiple Choice( Select 1 out of 4 options, for the question below )
A network comprising 0 multiple topologies

1)
Complex
2)
Hybrid
3)
Bus
4)
Star
Answer: 2

Question 72
The Parallels Desktop can be considered as the example of which of the following?

1)
TYPE-2 Hypervisor
2)
DISPATCHER
3)
TYPE-1 Hypervisor
4)
INTERPRETER
Answer: 1

Question 73
Multiple Choice( Select 1 out of 4 options, for the question below )
"When there is a lack of central point of control" Which type of Wireless network threat would you
classify this under?

1)
Man in the middle attack
2)
Identity Theft
3)
Ad Hoc Networks
4)
Non-Traditional Networks
Answer: 3
Question 74
Multiple Choice( Select 1 out of 4 options, for the question below )
A serially connected system of all the hubs of networks

1)
Bus
2)
Ring
3)
Daisy chains
4)
Star
Answer: 3

Question 75
Multiple Choice( Select 1 out of 4 options, for the question below )
Which of the following is also known as a Hypervisor?

1)
VMA
2)
VMM
3)
VMS
4)
VMR
Answer: 2

Question 76
"When bogus reconfiguration commands are used to affect routers and switches to degrade
network performance." Which type of Wireless network threat would you classify this under?

1)
Network Injection
2)
Malicious Association
3)
Man in the middle attack
4)
Denial Of Service
Answer: 1

Question 77
Multiple Choice( Select 1 out of 4 options, for the question below )
Into which expenditures does Cloud computing shifts capital expenditures?
1) local
2) operating
3) service
4) none of the mentioned
Question 78
_______ LAN topology describes the possible connections between pairs of networked end-points
that can communicate.
1) Complex
2) Physical
3) Logical
4) Incremental
Question 79
Multiple Choice( Select 1 out of 4 options, for the question below )
Wi-Fi stands for-
1) Wireless Fidelity
2) Wireless LAN
3) Wireless FLAN
4) None of the mentioned
Question 80
Total steps of deployment stage in cloud computing are?
1) 3
2) 4
3) 5
4) 6
Question 81
Multiple Choice( Select 1 out of 4 options, for the question below )
Among the following layers, which are not relted to SAN architecture
1) Storage layer
2) Host layer
3) Fabric layer
4) Object layer
Question 82
Study of creating a d using excryption techniques
1) Cipher
2) Cryptography
3) Encryption
4) Decryption

Question 83
An indirect form of surveillance.
1) Honey pot
2) Logical
3) Security
4) Intrusion

Question 84
Multiple Choice( Select 1 out of 4 options, for the question below )
What is netiquette?
1) A term used to describe network attacks
2) A malware that pretends to have ethical standards but attacks you when you least suspect it
3) The term for commonly accepted rules of how to behave online
4) Malware that can infect and spread wihtout human assistance
Question 85
A Cipher is which the order is not preserved.
1) Polyalphabetic substitution based
2) Transposition-based
3) Substitution based
4) Public Key based

Question 86
Multiple Choice( Select 1 out of 4 options, for the question below )
The protocol designed to make the security of wireless LAN as good as that of wired LAN
1) WTLS
2) WEP
3) RSN
4) WP

Question 87
After a message is encrypted, it is called________
1) plaintext
2) ciphertext
3) cryptotext
4) None
Question 88
Identify the highest degree of integration cloud computing
1) SaaS
2) PaaS
3) IaaS
4) CaaS

Question 89
Multiple Choice( Select 1 out of 4 options, for the question below )
QPS stands for?
1) Query period sites
2) Quantum per second
3) Quality per service
4) Query per second

You might also like